亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Measurement-device-independent quantum dialogue

        2021-10-28 07:10:04GuoFangShi石國芳
        Chinese Physics B 2021年10期

        Guo-Fang Shi(石國芳)

        School of Science,Xi’an University of Posts and Telecommunications,Xi’an 710061,China

        Keywords: quantum dialogue,entanglement state,Bell measurement

        1. Introduction

        Quantum communication is a new way to communicate by using the principles of quantum mechanics. Its security does not depend on the computational complexity in mathematics, but is guaranteed by the physical principles, and is absolutely secure. Quantum communication mainly includes quantum key distribution(QKD),quantum secure direct communication(QSDC),quantum secret sharing(QSS),etc.

        The task of QKD[1–3]is that it enables legitimate communicators to establish and share a secret key to encrypt and decrypt messages. Since the first QKD protocol based on a single-photon system was proposed by Bennett and Brassard in 1984(BB84 protocol),[1]many excellent protocols[2,3]have been put forward successively. Although QKD has the advantage of unconditional security in theory, it still provides potential opportunities for some eavesdropping behaviors[4–8]due to the imperfections of various devices in practical application. Among these imperfections, the defect of measurement equipment is particularly prominent. The solution to this problem is to build a nearly perfect device,which is obviously impractical. Fortunately,in 2012,Lo,Curty and Qi,three researchers,proposed a measurement-device-independent QKD(MID QKD) protocol,[9]which is independent of measurement devices. This QKD system is very different from the previous QKD scheme; that is, all the photons are measured by an untrusted third party. Such a system can be immune to all malicious attacks associated with measurement devices,and it will play a vital role in the development of QKD under real conditions in the future. Moreover,since the third party is in the middle of the two communication parties in the scheme,it can effectively extend the transmission distance of the QKD.All these remarkable advantages make this MID QKD one of the best candidates among all kinds of QKD protocols. It attracted the attention of many researchers as soon as it was reported, and has been an important research topic in recent years.[10–12]

        QSDC is another important branch of quantum communication developed in the past 20 years.[13–21]It is a unique technology, which can transmit confidential information directly without the help of secret key and ciphertext. Early QSDC was a one-way transmission of secret information, in 2004, Nguyen first generalized it to a two-way situation, socalled quantum dialogue.[22]This is a very interesting concept,in which Alice and Bob can send secret information each other. Since then,quantum dialogue has gradually grown and attracted lots of attention. However, in 2008, Gaoet al.[23]and Tanet al.[24]independently demonstrated that the quantum dialogue protocol[22]has the drawback of “secret information leakage” from the perspective of information theory,which does not meet the requirements of secure communication. Any secure bidirectional quantum communication protocol or quantum dialogue scheme should not only resist the conventional attacks of eavesdropper,but also avoid the defect of“secret information leakage”.[25–27]

        Recently,Niuet al.[28]and Zhouet al.[29]have presented the MID QSDC protocols. Inspired by their ideas,in this paper,we will design a MID quantum dialogue. In this protocol,Alice prepares N identical entangled EPR pairs as quantum channels, Bob prepares entangled EPR pairs according to his own secret information,and both communication parties send their photons sequences to the third party Charlie by means of the quantum data block transmission.[14–16]After a series of security tests, if the channel is secure, Alice will perform the Bell measurement and publish the results. The secret of Bob is transmitted to Alice by means of teleportation, and the secret of Alice is decoded by Bob with the knowledge of dense coding, thus, quantum dialogue is realized successfully. The security analysis shows that this scheme can not only effectively resist common attacks by eavesdroppers,but also avoid the defect of “secret information leakage”. Due to the use of the technology of MID, it can also be immune to all security loopholes associated with the measurement device. Compared with the previous MID quantum dialogue,[27]it is more concise and has higher communication efficiency. Besides, it is feasible with present-day technology.

        2. Measurement-device-independent quantum dialogue scheme

        An EPR pair is a commonly used pair of entangled photons in quantum communication, and its state is one of the following:

        Here 0 and 1 represent the horizontal and vertical polarization states of the photon. In this scheme,two communication parties agree that Bob prepares different quantum states according to the classic secret information bit 0 or 1 he wants to send. The specific corresponding relationship is

        The specific scheme consists of the following seven steps, as shown in Fig.1.

        Fig. 1. The illustration of MID quantum dialogue scheme. The black photon pairs (a1,t1)(a′1,t′1)(a2,t2)(a′2,t′2)···(aN,tN)(a′N,t′N) at Alice’s side are the EPR state |?+〉at in Eq. (1). The black photon pairs(b1,b′1),(b2,b′2)···(bN,b′N)prepared by Bob are one of EPR states according to Eqs.(1)and(2). The grey single-photon qubits are randomly prepared in one of the BB84 states

        Table 1.The source of photon pairs(ti,bi)and the use of Bell measurements in every situation.

        In Table 1,two photons in case(1)are both from the entangled pair of Alice and Bob,and Charlie’s Bell measurement is equivalent to allowing the photons in different entangled pairs to achieve entanglement swapping. Such photon pairs are most cases,and will be used to realize quantum dialogue.The photon pairs in case(3)will be discarded because only a small number of single photons are inserted. In order to make the security test effective,Alice and Bob only use the photons in case(2)to analyze the security of the step 2. The details are as follows:

        Alice and Bob exchange the basis information and quantum state of single photons through classical communication.For those single photons with different preparation basis,Bell measurement will lead to any one of four Bell states,as shown in Eqs.(4)and(5),it is not useful for security check and analysis.The decomposition of two photons with identical basis in terms of Bell state are shown as Eqs.(6)and(7),and there are only two possible Bell states. Using these single photons with the same basis,Alice and Bob can estimate that the transmission in Step 2 is secure or not. Such a security check is completely equivalent to the literature,[9]and can also be regarded as the“time reversal”of the QKD protocol(BBM92).[3]The behavior of the eavesdropper Eve would cause some errors when he chooses the wrong measurement basis. Alice and Bob compare and analyze, if the error rate is higher than a threshold, it indicates that Step 2 is insecure, and both parties abandon the above transmission and start again. If they confirm that the quantum channel is safe,then the next step is started.

        Table 2. Suppose Bob’s third secret is 1 and he prepares initial state|ψ?〉b3b′3.UT is a unitary operation to realize the teleportation of(b3,b′3)to(a3,a′3). The correspondence between Bell measurement outcomes(t3,b3),(t′3,b′3)of Charlie and UT performed by Alice.

        For Alice, from the Bell measurement result(UMUTaj,a′j) andUM, she can infer the initial state (bj,b′j)prepared by Bob and extract Bob’s 1-bit classical secret information. For Bob,according to the Bell measurement result of(UMUTaj,a′j) and his initial state, he can also extract Alice’s 1-bit secret message. The quantum dialogue has been realized. In the MID quantum communication scheme,whether it is based on a single-photon state[9,26,27]or an entangled state as a quantum channel,[28]the Bell measurement equipment has always been an indispensable component. Bell measurement using linear optical elements and single-photon detectors is favored because of its simple structure. Such Bell measurement devices can only distinguish two of the four Bell states,that is, they can only identify Bell states probabilistically.This fact will result in the halving of the efficiency both in the security check and the decoding message process,though it does not affect the security of the protocol. It should be noted that four EPR states must be distinguished completely in the current MID quantum dialogue protocol because the secret information in Step 7 carried by Bell state is 2 bits.That is to say, non-linear optical elements[30–32]should be used to accomplish complete Bell measurement in the present scheme.

        3. Security analysis of the protocol

        Now we will prove the security of this protocol.

        4. Discussion and conclusion

        Quantum dialogue belongs to the category of QSDC,in the current MID quantum dialogue scheme, it mainly involves Bell state preparation,single photon preparation,quantum storage, Bell state measurement and other technologies,and these technologies have been mature in the experimental realization of QSDC. In 2017, academician Guo guangcan’s research group realized an entanglement-based QSDC with the help of atom ensemble quantum memory.[34]In the same year, Zhuet al.increased the transmission distance of the entanglement-based QSDC in the optical fiber in the order of kilometers,[35]and achieved long-distance safe communication. In 2020, academician Pan Jianwei and his collaborators realized MID QKD in free space for the first time.[36]All these experimental successes undoubtedly show that the MID quantum dialogue protocol is achievable with current technology.

        国产免费内射又粗又爽密桃视频| 300部国产真实乱| 国内大量揄拍人妻在线视频| 成年女人在线观看毛片| 蜜臀久久久精品国产亚洲av| 亚洲中文字幕日韩综合| 久久久久亚洲av片无码| 亚洲av纯肉无码精品动漫| 2021年最新久久久视精品爱| 精品人妻一区二区三区av | 人妻有码av中文幕久久| 国产成人午夜福利在线观看| 亚洲aⅴ天堂av天堂无码麻豆| 国产欧美精品一区二区三区,| 久久视频在线视频精品| 国产精品久色婷婷不卡| 在线看无码的免费网站| 国精产品一区二区三区| 国产在线欧美日韩精品一区二区| 一区二区日本免费观看| 国产区女主播在线观看| 日韩制服国产精品一区| 亚洲AV成人无码久久精品四虎| 成人激情视频一区二区三区| 精品国产一区二区三区三级| 中文字幕无线码| 亚洲区小说区图片区| 国产免费视频一区二区| 亚洲国产中文字幕在线视频综合 | 一区二区在线观看精品在线观看| 中文天堂国产最新| 亚洲人免费| 丁香婷婷激情俺也去俺来也| 级毛片内射视频| 成人综合网亚洲伊人| 成年视频网站在线观看777| 亚洲精品98中文字幕| a级毛片免费完整视频| 亚洲中文字幕在线一区二区三区| 国产高清不卡二区三区在线观看| 又粗又黑又大的吊av|